City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 72.161.0.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43606
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;72.161.0.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 17:36:31 CST 2025
;; MSG SIZE rcvd: 104
42.0.161.72.in-addr.arpa domain name pointer 72-161-0-42.dyn.centurytel.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.0.161.72.in-addr.arpa name = 72-161-0-42.dyn.centurytel.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 94.231.164.168 | attackspambots | Unauthorized connection attempt detected from IP address 94.231.164.168 to port 23 [T] |
2020-08-16 02:28:30 |
| 109.110.40.63 | attackspambots | Unauthorised access (Aug 15) SRC=109.110.40.63 LEN=40 TTL=48 ID=27024 TCP DPT=8080 WINDOW=8167 SYN Unauthorised access (Aug 15) SRC=109.110.40.63 LEN=40 TTL=48 ID=18809 TCP DPT=8080 WINDOW=47011 SYN Unauthorised access (Aug 14) SRC=109.110.40.63 LEN=40 TTL=48 ID=2625 TCP DPT=8080 WINDOW=8167 SYN Unauthorised access (Aug 14) SRC=109.110.40.63 LEN=40 TTL=48 ID=30679 TCP DPT=8080 WINDOW=8167 SYN |
2020-08-16 02:51:19 |
| 60.209.136.34 | attackbotsspam | Port scan: Attack repeated for 24 hours |
2020-08-16 02:34:03 |
| 222.186.175.167 | attackspam | Aug 15 11:59:46 dignus sshd[26098]: Failed password for root from 222.186.175.167 port 29786 ssh2 Aug 15 11:59:49 dignus sshd[26098]: Failed password for root from 222.186.175.167 port 29786 ssh2 Aug 15 11:59:52 dignus sshd[26098]: Failed password for root from 222.186.175.167 port 29786 ssh2 Aug 15 11:59:55 dignus sshd[26098]: Failed password for root from 222.186.175.167 port 29786 ssh2 Aug 15 11:59:59 dignus sshd[26098]: Failed password for root from 222.186.175.167 port 29786 ssh2 ... |
2020-08-16 03:00:41 |
| 80.82.78.85 | attack |
|
2020-08-16 02:30:44 |
| 116.12.200.194 | attackspambots | Unauthorized connection attempt detected from IP address 116.12.200.194 to port 445 [T] |
2020-08-16 02:50:35 |
| 117.107.203.18 | attackspam |
|
2020-08-16 02:26:50 |
| 194.87.138.201 | attackspambots |
|
2020-08-16 03:03:06 |
| 202.163.71.22 | attackbots | Unauthorized connection attempt detected from IP address 202.163.71.22 to port 3389 [T] |
2020-08-16 02:40:04 |
| 156.204.217.248 | attackbotsspam | Unauthorized connection attempt detected from IP address 156.204.217.248 to port 445 [T] |
2020-08-16 02:46:11 |
| 89.23.10.12 | attackbots | port scan and connect, tcp 23 (telnet) |
2020-08-16 02:54:28 |
| 41.63.7.129 | attackbotsspam | Unauthorized connection attempt detected from IP address 41.63.7.129 to port 445 [T] |
2020-08-16 02:36:28 |
| 109.191.97.181 | attack | Unauthorized connection attempt detected from IP address 109.191.97.181 to port 22 [T] |
2020-08-16 02:50:51 |
| 178.76.194.226 | attack | Unauthorized connection attempt detected from IP address 178.76.194.226 to port 23 [T] |
2020-08-16 02:23:58 |
| 171.244.129.66 | attackbots | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-08-16 02:45:40 |